International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019
p-ISSN: 2395-0072
www.irjet.net
MULTI-FACTOR AUTHENTICATION BASED ON GAME MODE FOR ANDROID APPLICATION Isswarya Murugan1, Manimekalai. S2, Mounika. G3, Anand. C4 1,2,3Students,
Department of Information Technology, Jeppiaar SRR Engineering College, Chennai, Tamil Nadu, India. 4Assistant Professor, Dept. of Information Technology, Jeppiaar SRR Engineering College, Chennai, Tamil Nadu, India ---------------------------------------------------------------------***---------------------------------------------------------------------Abstract - There are no simple solution for authentication exists to achieve security and memorability. In order to occur these goals, we propose a Multi-fAcet Password Scheme (MAPS) for mobile authentication. This MAPS combines the information from multiple facets to form a password, which allows MAPS to enlarge the password space and improve memorability by reducing memory interference. Based on this, we implement a Chess-based MAPS (CMAPS) for Android systems. Only two and six gestures are required for CMAPS to generate passwords with better security strength than 4-digit PINs and 8-character alphanumeric passwords, respectively. Our user studies show that CMAPS can achieve high recall rates while exceeding the security strength of standard 8character alphanumeric passwords used for secure applications.
keyboard. Due to the limited size of the soft keyboard, text input is relatively slow and typo-prone, leading to frustrating usability issues. Poor usability, can lead to users choosing short or easy to type passwords as a workaround. We are proposing the concept of Multi-fAcet Password Scheme (MAPS) for mobile authentication. Instead of repeating the same type of information, such as characters in alphanumeric passwords and dot connections in Google's pattern unlock, MAPS combines information from multiple facets, i.e., multiple types of information, to generate passwords. Because of combining information from multiple facets, MAPS can generate a huge number of passwords Based on the idea of MAPS, we design and implement a Chess-based MAPS (CMAPS) as an example of MAPS. We formally analyze the security strength of CMAPS and prove that CMAPS is more secure than existing mobile authentication schemes. Only two and six gestures are required for CMAPS to get passwords with higher security strength than 4-digit PINs and 8-character alphanumerical passwords severely. The advantage is because CMAPS can fuse information from multiple facets through a single gesture and using multiple facets can significantly enlarge the password space.
Key Words: Authentication, human computer interaction, graphical user interfaces. 1. INTRODUCTION The popularity of mobile devices is due to ubiquitous Internet access through communication technologies such as WiFi and 4G/LTE, easy to use numerous applications and games. In meantime, the security of mobile devices is becoming a major concern as device users are storing sensitive data such as personal contacts and utilizing sensitive information. Authentication, the first defense mechanism preventing unauthorized access to a mobile device, allows owners of mobile devices to unlock and use their devices. Designing an authentication for mobile devices is a challenging task because the scheme should be secure, capable of generating human-memorable passwords, and usable.
2. RELATED WORK In this section, we review related work on graphical passwords, mobile authentication, and gamification. 2.1 Graphical password The original proposal for the graphical password is the US patent filed by Blonder [5] in 1996. Blonder’s implementation shows users a number of ‘‘tap regions’’ in a predetermined image, and requires users to set a password by arranging these regions by location and sequence. It was inferred that a graphical approach provides better memorability than traditional passwords because the human brain is relatively weak at remembering sequences of numbers or letters, but good at processing visual data [5], [6]. As graphical authentication schemes gained popularity, they were grouped into three categories: recognition-based schemes, recall-based schemes, or cued-recall schemes [9]. The classification is based on memory tasks as outlined in
A secure authentication scheme should have a large password space, i.e., a large number of possible passwords. In this paper, we separate memorability from usability to give importance for memorability. It has been recognized that no silver bullet exists to achieve both security and memorability. Obviously with the addition of a usability requirement, the task becomes even more challenging. The alphanumeric password scheme, which has been used for decades for various computer systems, is not suitable for mobile authentication. Most mobile devices support the touch based soft keyboard, which replaces the hardware
© 2019, IRJET
|
Impact Factor value: 7.211
|
ISO 9001:2008 Certified Journal
|
Page 2203